Displaying 9 results from an estimated 9 matches for "krb5_cleanup_proc".
2004 Feb 27
1
[PATCH] Getting AFS tokens from a GSSAPI-delegated TGT
...+ if (authctxt->krb5_fwd_ccache)
+ return;
+ ccname = getenv("KRB5CCNAME");
+ if (!ccname)
+ return;
+ debug("using ccname=%.100s", ccname);
+ if (krb5_init(authctxt))
+ return;
+ krb5_cc_resolve(authctxt->krb5_ctx, ccname, &authctxt->krb5_fwd_ccache);}
+
void
krb5_cleanup_proc(Authctxt *authctxt)
{
--- orig/auth.h
+++ mod/auth.h
@@ -120,6 +120,7 @@
int auth_krb5_tgt(Authctxt *authctxt, krb5_data *tgt);
int auth_krb5_password(Authctxt *authctxt, const char *password);
void krb5_cleanup_proc(Authctxt *authctxt);
+void session_krb5_use_ccache(Authctxt *authctxt);
#en...
2006 Sep 18
1
BSD Auth: set child environment variables requested by login script [PATCH]
...n/ssh/auth.h
===================================================================
RCS file: /cvs/src/usr.bin/ssh/auth.h,v
retrieving revision 1.58
diff -u -r1.58 auth.h
--- usr.bin/ssh/auth.h 18 Aug 2006 09:15:20 -0000 1.58
+++ usr.bin/ssh/auth.h 18 Sep 2006 09:32:23 -0000
@@ -123,6 +123,10 @@
void krb5_cleanup_proc(Authctxt *authctxt);
#endif /* KRB5 */
+#ifdef BSD_AUTH
+void bsdauth_child_set_env(char ***envp, u_int *envsizep);
+#endif
+
void do_authentication(Authctxt *);
void do_authentication2(Authctxt *);
Index: usr.bin/ssh/session.c
================================================================...
2007 Jun 17
19
[Bug 1322] New: pam_end() is not called if authentication fails, which breaks pam-abl
http://bugzilla.mindrot.org/show_bug.cgi?id=1322
Summary: pam_end() is not called if authentication fails, which
breaks pam-abl
Product: Portable OpenSSH
Version: 4.6p1
Platform: Other
URL: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=405041
OS/Version: Linux
Status: NEW
Severity:
2002 Jul 31
2
privsep+kerb5+ssh1
...RB4 */
#ifdef KRB5
-int auth_krb5(Authctxt *authctxt, krb5_data *auth, char **client);
+int auth_krb5(Authctxt *authctxt, krb5_data *auth, char **client, krb5_data *);
int auth_krb5_tgt(Authctxt *authctxt, krb5_data *tgt);
int auth_krb5_password(Authctxt *authctxt, const char *password);
void krb5_cleanup_proc(void *authctxt);
2015 Jul 24
3
Cisco vs. 6.9
...closed by A.B.C.D
debug1: channel 0: free: server-session, nchannels 1
debug3: channel 0: status: The following connections are open:
#0 server-session (t10 r3 i0/0 o0/0 fd -1/-1 cc -1)
debug1: session_close: session 0 pid 0
debug3: session_unused: session id 0 unused
debug1: do_cleanup
debug1: krb5_cleanup_proc called
Transferred: sent 3680, received 816 bytes
Closing connection to A.B.C.D port 57737
debug3: mm_request_send entering: type 50
debug3: mm_request_receive entering
debug3: monitor_read: checking request 50
debug3: mm_answer_term: tearing down sessions
Howard
-------------- next part --------...
2015 Jul 23
3
Cisco vs. 6.9
After upgrading a Linux system from OpenSSH 6.7 to 6.9, Cisco
switches/routers can no longer scp config files to/from the system. The
last debug entry before the Cisco device closes the connection is "debug1:
server_input_channel_open: confirm session". The next line is "Connection
closed by x.x.x.x". Anyone else seen this or know of a fix? The Cisco
device gives
2006 Nov 22
10
[Bug 1264] Channel not close by sshd Server
...ebug3:
mm_auth_password entering debug3: mm_request_send entering: type 10
debug3: monitor_read: checking request 10 debug3: auth_allowed:
method=kerberos user=root debug1: temporarily_use_uid: 0/3 (e=0/3)
debug1: restore_uid: 0/3 debug1: Kerberos password authentication
failed: -1765328249 debug1: krb5_cleanup_proc called debug3:
auth_allowed: method=kerberos_or_local user=root debug3: PAM:
sshpam_passwd_conv called with 1 messages debug1: PAM: password
authentication accepted for root debug3: mm_answer_authpassword:
sending result 1 debug3: mm_request_send entering: type 11 debug3:
mm_request_receive_expect...
2003 Sep 26
0
openssh 3.7.1p2 linux port problem
...0: is dead
debug2: channel 0: garbage collecting
debug1: channel 0: free: server-session, nchannels 1
debug3: channel 0: status: The following connections
are open:
#0 server-session (t4 r0 i3/0 o3/0 fd -1/-1)
debug3: channel 0: close_fds r -1 w -1 e -1
Connection closed by 192.168.1.253
debug1: krb5_cleanup_proc called
Closing connection to 192.168.1.253
# ssh -v -v -v output
OpenSSH_3.6.1p2, SSH protocols 1.5/2.0, OpenSSL
0x0090602f
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Rhosts Authentication disabled, originating
port will not be trusted.
debug2: ssh_connect: needpriv 0
debug1:...
2014 Jul 15
3
GSSAPI
If I am trying to build OpenSSH 6.6 with Kerberos GSSAPI support, do I still need to get Simon Wilkinson's patches?
---
Scott Neugroschl | XYPRO Technology Corporation
4100 Guardian Street | Suite 100 |Simi Valley, CA 93063 | Phone 805 583-2874|Fax 805 583-0124 |